CN110768792A - Master key generation method and device and encryption and decryption method of sensitive security parameters - Google Patents
Master key generation method and device and encryption and decryption method of sensitive security parameters Download PDFInfo
- Publication number
- CN110768792A CN110768792A CN201910943934.1A CN201910943934A CN110768792A CN 110768792 A CN110768792 A CN 110768792A CN 201910943934 A CN201910943934 A CN 201910943934A CN 110768792 A CN110768792 A CN 110768792A
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- component
- mobile intelligent
- key
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 109
- 230000005540 biological transmission Effects 0.000 claims description 47
- 238000012795 verification Methods 0.000 claims description 25
- 238000013524 data verification Methods 0.000 claims description 18
- 238000009795 derivation Methods 0.000 claims description 9
- 238000013500 data storage Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 7
- 239000000284 extract Substances 0.000 claims description 7
- 231100000279 safety data Toxicity 0.000 claims 10
- 239000004576 sand Substances 0.000 claims 1
- 238000004891 communication Methods 0.000 abstract description 16
- 230000008569 process Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 11
- 238000007726 management method Methods 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本发明涉及网络安全领域,尤其涉及一种主密钥生成方法、装置及敏感安全参数的加解密方法。The invention relates to the field of network security, in particular to a method and device for generating a master key and an encryption and decryption method for sensitive security parameters.
背景技术Background technique
在开放移动网络和便携移动终端系统环境中,如何保护敏感安全参数(如公私密钥对中的私钥)成为移动智能终端密码软件模块设计和实现的核心问题。在移动智能终端中,对敏感安全数据进行加密存储是解决软件密码模块安全性的主要方法。对敏感安全数据进行加密的密钥也被称为主密钥,主密钥是生成会话密钥、加密密钥等其他类型密钥的种子,对这些密钥的分发和安全保护具有重要的意义。如果主密钥被窃取,将会对敏感安全数据的安全构成严重威胁。In the environment of open mobile network and portable mobile terminal system, how to protect sensitive security parameters (such as the private key in the public-private key pair) has become the core issue in the design and implementation of the cryptographic software module of the mobile intelligent terminal. In a mobile intelligent terminal, encrypting and storing sensitive security data is the main method to solve the security of the software cryptographic module. The key used to encrypt sensitive security data is also called the master key. The master key is the seed for generating session keys, encryption keys and other types of keys, which is of great significance to the distribution and security protection of these keys. . If the master key is stolen, it will pose a serious threat to the security of sensitive security data.
在已有的公开文献中,通常不对主密钥的生成过程进行描述。少数公开文献中描述的主密钥生成过程通常是在本地取特征值,利用这些特征值生成主密钥。也就是说,主密钥的生成通常在移动通信的一端(移动端或服务端)完成,一旦这一端被攻破,主密钥或用于生成主密钥的信息就有可能被泄露,给网络安全带来严重威胁。In the existing public literature, the generation process of the master key is usually not described. The master key generation process described in a few public documents usually takes eigenvalues locally, and uses these eigenvalues to generate the master key. That is to say, the generation of the master key is usually done at one end of the mobile communication (mobile or server). Once this end is breached, the master key or the information used to generate the master key may be leaked to the network. security poses a serious threat.
发明内容SUMMARY OF THE INVENTION
本发明实施例提供一种主密钥生成方法、装置及敏感安全参数的加解密方法,用以解决现有技术中敏感安全数据的安全性问题,实现对敏感安全数据的保护。Embodiments of the present invention provide a master key generation method, a device, and an encryption and decryption method for sensitive security parameters, which are used to solve the security problem of sensitive security data in the prior art and realize the protection of sensitive security data.
第一方面,本发明实施例提供一种主密钥生成方法,包括:In a first aspect, an embodiment of the present invention provides a method for generating a master key, including:
将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥;其中,Combining the personal characteristic data of the mobile intelligent terminal and the server-side master key component, and generating a master key based on the combined result; wherein,
所述移动智能终端个人特征数据为与用户个人特征有关的数据,所述服务端主密钥分量为服务端密码组件生成的随机数。The personal characteristic data of the mobile intelligent terminal is data related to the personal characteristic of the user, and the server-side master key component is a random number generated by the server-side password component.
基于上述任一本发明实施例,所述基于组合后的结果生成主密钥包括:采用密钥派生算法对组合后的结果进行计算,生成主密钥。Based on any of the above embodiments of the present invention, the generating the master key based on the combined result includes: using a key derivation algorithm to calculate the combined result to generate the master key.
本发明实施例所公开的主密钥生成方法在生成主密钥时既采用了移动智能终端的移动智能终端个人特征数据,又采用了服务端的服务端主密钥分量,主密钥的生成不依赖于通信一端的数据,能有效地提高主密钥的安全性。The master key generation method disclosed in the embodiment of the present invention uses both the mobile intelligent terminal personal characteristic data of the mobile intelligent terminal and the server master key component of the server when generating the master key. Relying on the data at one end of the communication can effectively improve the security of the master key.
第二方面,本发明实施例提供一种敏感安全数据加密方法,包括:In a second aspect, an embodiment of the present invention provides a sensitive security data encryption method, including:
移动智能终端个人特征数据传输步骤,移动智能终端密码组件将所获得的移动智能终端个人特征数据传输给服务端密码组件;The mobile intelligent terminal personal characteristic data transmission step, the mobile intelligent terminal password component transmits the obtained mobile intelligent terminal personal characteristic data to the server password component;
服务端主密钥分量与移动智能终端个人特征数据存储步骤,所述服务端密码组件将所生成的服务端主密钥分量与所接收的所述移动智能终端个人特征数据保存在密钥容器中;The step of storing the server-side master key component and the mobile intelligent terminal personal characteristic data, the server-side cipher component saves the generated server-side master key component and the received personal characteristic data of the mobile intelligent terminal in a key container ;
服务端主密钥分量传输步骤,所述移动智能终端密码组件从所述服务端密码组件接收所述服务端主密钥分量;a server-side master key component transmission step, wherein the mobile intelligent terminal cryptographic component receives the server-side master key component from the server-side cryptographic component;
主密钥生成步骤,基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成方法生成主密钥;The master key generation step, based on the personal characteristic data of the mobile intelligent terminal and the server master key component, adopts the master key generation method to generate a master key;
加密步骤,采用所述主密钥对敏感安全数据进行加密,将加密后的敏感安全数据保存在所述密钥容器中。In the encryption step, the master key is used to encrypt the sensitive security data, and the encrypted sensitive security data is stored in the key container.
基于上述任一本发明实施例,所述移动智能终端个人特征数据传输步骤包括:Based on any of the above embodiments of the present invention, the step of transmitting personal characteristic data of the mobile intelligent terminal includes:
所述服务端密码组件取得随机数R后,将所述随机数R发送给所述移动智能终端密码组件;After the server cryptographic component obtains the random number R, it sends the random number R to the mobile intelligent terminal cryptographic component;
所述移动智能终端密码组件生成自身的公私钥对(PM、Dm),计算移动智能终端个人特征数据的杂凑值HPPD;The mobile intelligent terminal cryptographic component generates its own public and private key pair (P M , D m ), and calculates the hash value HPPD of the personal characteristic data of the mobile intelligent terminal;
所述移动智能终端密码组件将随机数R、个人特征数据的杂凑值HPPD以及移动智能终端密码组件的公钥PM的合并值(R||HPPD||PM)使用随机生成的密钥rM加密,得到C1,使用服务端密码组件的公钥PS对所述随机生成的密钥rM加密得到C2;其中,||表示合并;The cryptographic component of the smart mobile terminal uses the random number R, the hash value HPPD of the personal characteristic data, and the combined value ( R ||HPPD|| PM ) of the public key PM of the cryptographic component of the smart mobile terminal with a randomly generated key r M is encrypted to obtain C 1 , and C 2 is obtained by encrypting the randomly generated key r M by using the public key P S of the cryptographic component of the server; wherein, || represents a combination;
所述移动智能终端密码组件将数据C2||C1发送给服务端密码组件。The mobile intelligent terminal cryptographic component sends the data C 2 ||C 1 to the server-side cryptographic component.
基于上述任一本发明实施例,所述服务端主密钥分量与移动智能终端个人特征数据存储步骤包括:Based on any of the above embodiments of the present invention, the step of storing the server master key component and the personal characteristic data of the mobile intelligent terminal includes:
所述服务端密码组件接收数据C2||C1,然后使用自身私钥dS解密C2,得到随机生成的密钥rM,然后使用rM解密C1,得到(R||HPPD||PM);The server-side cryptographic component receives data C 2 ||C 1 , then decrypts C 2 with its own private key d S to obtain a randomly generated key r M , and then decrypts C 1 with r M to obtain (R||HPPD| |P M );
所述服务端密码组件生成用户ID、生成服务端主密钥分量SS-MKC,然后将个人特征数据的杂凑值HPPD、服务端主密钥分量SS-MKC、移动智能终端密码组件的公钥PM、PPD尝试次数合并生成的(HPPD||SS-MKC||PM||PPD尝试次数)使用服务端密码组件存储密钥KS进行加密,将加密得到的结果以用户ID为索引存储在密钥容器中;其中,PPD尝试次数是一个用来反映用户尝试输入个人特征信息次数的值。The server cipher component generates a user ID, generates a server master key component SS-MKC, and then combines the hash value HPPD of the personal characteristic data, the server master key component SS-MKC, and the public key P of the mobile intelligent terminal cipher component. M and PPD attempts are combined to generate (HPPD||SS-MKC||P M ||PPD attempts) using the server-side password component storage key K S for encryption, and the encrypted result is stored in the user ID as an index. In the key container; wherein, the number of PPD attempts is a value used to reflect the number of times the user attempts to enter personal characteristic information.
基于上述任一本发明实施例,所述服务端主密钥分量传输步骤包括:Based on any of the above embodiments of the present invention, the step of transmitting the server master key component includes:
所述服务端密码组件将随机数R、服务端主密钥分量SS-MKC、用户ID合并生成的(R||MKC||用户ID)使用服务端密码组件自身密钥dS签名,得到rs1;The server-side cipher component combines the random number R, the server-side master key component SS-MKC, and the user ID to generate (R||MKC||user ID) and signs it with the server-side cipher component's own key d S to obtain rs 1 ;
所述服务端密码组件将(R||MKC||用户ID||rs1)使用另一随机生成的密钥rMs加密,得到C1s,并将该密钥rMs使用移动智能终端密码组件的公钥PM加密得到C2s;The server-side cipher component encrypts (R||MKC||user ID||rs 1 ) with another randomly generated key r Ms to obtain C 1s , and uses the key r Ms with the mobile smart terminal cipher component The public key PM encrypts to obtain C 2s ;
所述服务端密码组件将C2s||C1s发送给所述移动智能终端密码组件;The server-side cryptographic component sends C 2s || C 1s to the mobile intelligent terminal cryptographic component;
所述移动智能终端密码组件使用其自身的私钥dM解密C2s,得到rMs,然后使用rMs解密C1s,得到(R||MKC||用户ID||rs1);The mobile intelligent terminal cryptographic component uses its own private key d M to decrypt C 2s to obtain r Ms , and then uses r Ms to decrypt C 1s to obtain (R||MKC||user ID||rs 1 );
所述移动智能终端密码组件签名验签rs1;The mobile intelligent terminal cryptographic component signature verification rs1 ;
所述移动智能终端密码组件保存用户ID作为移动智能终端密码组件的标识。The mobile intelligent terminal password component stores the user ID as the identification of the mobile intelligent terminal password component.
本发明实施例所公开的敏感安全数据加密方法基于移动智能终端个人特征数据以及服务端主密钥分量来生成主密钥、通过该主密钥对敏感安全数据进行加密,并且将服务端主密钥分量、移动智能终端个人特征数据、利用主密钥加密的敏感安全数据都保存在密钥容器中,极大地增加了敏感安全数据的安全性。The sensitive security data encryption method disclosed in the embodiment of the present invention generates a master key based on the personal characteristic data of the mobile intelligent terminal and the server master key component, encrypts the sensitive security data by using the master key, and encrypts the server master key The key components, the personal characteristic data of the mobile smart terminal, and the sensitive security data encrypted with the master key are all stored in the key container, which greatly increases the security of the sensitive security data.
第三方面,本发明实施例提供一种敏感安全数据解密方法,用于对采用所述敏感安全数据加密方法加密的敏感安全数据进行解密,包括:In a third aspect, an embodiment of the present invention provides a sensitive security data decryption method for decrypting sensitive security data encrypted by the sensitive security data encryption method, including:
待验证的移动智能终端个人特征数据传输步骤,移动智能终端密码组件将所获得的待验证的移动智能终端个人特征数据传输给服务端密码组件;The step of transmitting the personal characteristic data of the mobile intelligent terminal to be verified, the mobile intelligent terminal password component transmits the obtained personal characteristic data of the mobile intelligent terminal to be verified to the server password component;
移动智能终端个人数据验证成功步骤,所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对一致;The step of successfully verifying the personal data of the mobile intelligent terminal, the server-side cipher component extracts the stored personal characteristic data of the mobile intelligent terminal and the server-side master key component from the key container, and the mobile intelligent terminal personal characteristic data to be verified is the same as the one. The stored personal data of the mobile intelligent terminal is checked and consistent;
服务端主密钥分量传输步骤,所述服务端主密钥分量传输到所述移动智能终端密码组件;The server master key component transmission step, the server master key component is transmitted to the mobile intelligent terminal encryption component;
主密钥生成步骤,基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成方法生成主密钥;The master key generation step, based on the personal characteristic data of the mobile intelligent terminal and the server master key component, adopts the master key generation method to generate a master key;
解密步骤,从密钥容器中获取加密后的敏感安全数据,采用主密钥对该加密后的敏感安全数据进行解密,得到未经加密的敏感安全数据。In the decryption step, the encrypted sensitive security data is obtained from the key container, and the encrypted sensitive security data is decrypted by using the master key to obtain unencrypted sensitive security data.
基于上述任一本发明实施例,还包括:移动智能终端个人数据验证失败步骤,所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对不一致,将所述服务端主密钥分量清零,所述移动智能终端密码组件识别出所述服务端主密钥分量的值为零时提示失败,结束操作。Based on any of the above embodiments of the present invention, the method further includes: a step of failing the personal data verification of the mobile intelligent terminal, wherein the server-side cipher component extracts the stored personal characteristic data of the mobile intelligent terminal and the server-side master key component from the key container, The personal characteristic data of the mobile intelligent terminal to be verified is inconsistent with the stored personal data of the mobile intelligent terminal, the server master key component is cleared, and the mobile intelligent terminal password component identifies the server If the value of the master key component is zero, it will prompt failure and end the operation.
基于上述任一本发明实施例,所述待验证的移动智能终端个人特征数据传输步骤包括:Based on any of the above embodiments of the present invention, the step of transmitting the personal characteristic data of the mobile intelligent terminal to be verified includes:
所述移动智能终端密码组件向所述服务端密码组件请求移动智能终端个人特征数据验证;The mobile intelligent terminal password component requests the mobile intelligent terminal personal characteristic data verification from the server-side password component;
所述服务端密码组件发送随机数R给所述移动智能终端密码组件;The server-side cryptographic component sends a random number R to the mobile intelligent terminal cryptographic component;
移动智能终端密码组件将随机数R、用户ID、待验证的移动智能终端个人特征数据杂凑值HPPD′进行合并,根据该合并结果(R||用户ID||HPPD′)分别随机生成密钥rM1、rM2,使用rM1加密得到C1,并将C1||rM1||rM2使用服务端密码组件的公钥PS加密,得到C2;The cryptographic component of the smart mobile terminal combines the random number R, the user ID, and the hash value HPPD' of the personal characteristic data of the smart mobile terminal to be verified, and randomly generates the key r according to the combined result (R||user ID||HPPD'). M1 and r M2 , use r M1 to encrypt to obtain C 1 , and encrypt C 1 ||r M1 ||r M2 with the public key P S of the server cipher component to obtain C 2 ;
所述移动智能终端密码组件将数据(C2||C1)发送给服务端密码组件。The mobile intelligent terminal cryptographic component sends the data (C 2 ||C 1 ) to the server-side cryptographic component.
基于上述任一本发明实施例,所述移动智能终端个人数据验证成功步骤包括:Based on any of the above embodiments of the present invention, the successful step of verifying the personal data of the mobile intelligent terminal includes:
所述服务端密码组件使用自身私钥dS解密C2,得到rM1和rM2,然后使用rM1解密C1得到(R||用户ID||HPPD′);The server-side cryptographic component uses its own private key d S to decrypt C 2 to obtain r M1 and r M2 , and then uses r M1 to decrypt C 1 to obtain (R||user ID||HPPD');
所述服务端密码组件根据用户ID从密钥容器中得到移动智能终端密码组件的对应数据(HPPD||MKC||PM||PPD尝试次数),并用服务端密码组件存储密钥KS解密,成功验证待验证的移动智能终端个人特征数据杂凑值HPPD′与移动智能终端个人特征数据杂凑值HPPD的一致性、PPD尝试次数。The server cipher component obtains the corresponding data of the mobile intelligent terminal cipher component (HPPD||MKC||PM||PPD attempts) from the key container according to the user ID, and decrypts it with the server cipher component storage key K S , The consistency of the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified and the hash value HPPD of the personal characteristic data of the mobile intelligent terminal, and the number of PPD attempts are successfully verified.
本发明实施例提供的敏感安全数据解密方法基于移动智能终端个人特征数据以及服务端主密钥分量来生成主密钥、通过该主密钥对经加密的敏感安全数据进行解密,由于在生成主密钥前需要将待验证的移动智能终端个人特征数据与预先保存在密钥容器中的移动智能终端个人特征数据进行比较验证,因此能够极大地提高敏感安全数据的安全性。The sensitive security data decryption method provided by the embodiment of the present invention generates a master key based on the personal characteristic data of the mobile intelligent terminal and the server master key component, and decrypts the encrypted sensitive security data by using the master key. Before the key, it is necessary to compare and verify the personal characteristic data of the mobile intelligent terminal to be verified with the personal characteristic data of the mobile intelligent terminal stored in the key container in advance, so the security of sensitive security data can be greatly improved.
第四方面,本发明实施例提供一种主密钥生成装置,包括:In a fourth aspect, an embodiment of the present invention provides an apparatus for generating a master key, including:
主密钥生成模块,用于将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥;其中,The master key generation module is used to combine the personal characteristic data of the mobile intelligent terminal and the server master key component, and generate a master key based on the combined result; wherein,
所述移动智能终端个人特征数据为与用户个人特征有关的数据,所述服务端主密钥分量为服务端密码组件生成的随机数。The personal characteristic data of the mobile intelligent terminal is data related to the personal characteristic of the user, and the server-side master key component is a random number generated by the server-side password component.
基于上述任一本发明实施例,所述基于组合后的结果生成主密钥包括:采用密钥派生算法对组合后的结果进行计算,生成主密钥。Based on any of the above embodiments of the present invention, the generating the master key based on the combined result includes: using a key derivation algorithm to calculate the combined result to generate the master key.
第五方面,本发明实施例提供一种敏感安全数据加密装置,包括:In a fifth aspect, an embodiment of the present invention provides a sensitive security data encryption device, including:
移动智能终端个人特征数据传输模块,用于移动智能终端密码组件将所获得的移动智能终端个人特征数据传输给服务端密码组件;The mobile intelligent terminal personal characteristic data transmission module is used for the mobile intelligent terminal password component to transmit the obtained mobile intelligent terminal personal characteristic data to the server password component;
服务端主密钥分量与移动智能终端个人特征数据存储模块,用于所述服务端密码组件将所生成的服务端主密钥分量与所接收的所述移动智能终端个人特征数据保存在密钥容器中;The server-side master key component and the mobile intelligent terminal personal characteristic data storage module is used for the server-side cipher component to store the generated server-side master key component and the received personal characteristic data of the mobile intelligent terminal in the key. in a container;
服务端主密钥分量传输模块,用于所述移动智能终端密码组件从所述服务端密码组件接收所述服务端主密钥分量;a server-side master key component transmission module, used for the mobile intelligent terminal cryptographic component to receive the server-side master key component from the server-side cryptographic component;
主密钥生成模块,用于基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成装置生成主密钥;a master key generation module for generating a master key by using the master key generation device based on the personal characteristic data of the mobile intelligent terminal and the server master key component;
加密模块,用于采用所述主密钥对敏感安全数据进行加密,将加密后的敏感安全数据保存在所述密钥容器中。The encryption module is used for encrypting the sensitive security data by using the master key, and storing the encrypted sensitive security data in the key container.
基于上述任一本发明实施例,所述移动智能终端个人特征数据传输模块包括:Based on any of the above embodiments of the present invention, the personal characteristic data transmission module of the mobile intelligent terminal includes:
随机数生成与传输单元,用于所述服务端密码组件取得随机数R后,将所述随机数R发送给所述移动智能终端密码组件;a random number generation and transmission unit, configured to send the random number R to the mobile smart terminal cryptographic component after the server-side cryptographic component obtains the random number R;
密钥对与杂凑值生成单元,用于所述移动智能终端密码组件生成自身的公私钥对(PM、Dm),计算移动智能终端个人特征数据的杂凑值HPPD;a key pair and hash value generation unit, used for the mobile intelligent terminal cryptographic component to generate its own public and private key pair (P M , D m ), and to calculate the hash value HPPD of the personal characteristic data of the mobile intelligent terminal;
合并与加密单元,用于所述移动智能终端密码组件将随机数R、个人特征数据的杂凑值HPPD以及移动智能终端密码组件的公钥PM的合并值(R||HPPD||PM)使用随机生成的密钥rM加密,得到C1,使用服务端密码组件的公钥PS对所述随机生成的密钥rM加密得到C2;其中,||表示合并;A merging and encrypting unit, used for the random number R, the hash value HPPD of the personal characteristic data, and the combined value ( R ||HPPD|| PM ) of the public key PM of the cryptographic component of the mobile intelligent terminal Use the randomly generated key r M to encrypt to obtain C 1 , and use the public key P S of the server cipher component to encrypt the randomly generated key r M to obtain C 2 ; where || represents a combination;
传输单元,用于所述移动智能终端密码组件将数据C2||C1发送给服务端密码组件。A transmission unit, used for the mobile smart terminal cryptographic component to send the data C 2 ||C 1 to the server-side cryptographic component.
基于上述任一本发明实施例,所述服务端主密钥分量与移动智能终端个人特征数据存储模块包括:Based on any of the above embodiments of the present invention, the server master key component and the mobile intelligent terminal personal characteristic data storage module include:
解密单元,用于所述服务端密码组件接收数据C2||C1,然后使用自身私钥dS解密C2,得到随机生成的密钥rM,然后使用rM解密C1,得到(R||HPPD||PM);A decryption unit, used for the server cipher component to receive data C 2 ||C 1 , and then use its own private key d S to decrypt C 2 to obtain a randomly generated key r M , and then use r M to decrypt C 1 to obtain ( R||HPPD||P M );
存储单元,用于所述服务端密码组件生成用户ID、生成服务端主密钥分量SS-MKC,然后将个人特征数据的杂凑值HPPD、服务端主密钥分量SS-MKC、移动智能终端密码组件的公钥PM、PPD尝试次数合并生成的(HPPD||SS-MKC||PM||PPD尝试次数)使用服务端密码组件存储密钥KS进行加密,将加密得到的结果以用户ID为索引存储在密钥容器中;其中,PPD尝试次数是一个用来反映用户尝试输入个人特征信息次数的值。The storage unit is used for the server cipher component to generate the user ID, the server master key component SS-MKC, and then the hash value HPPD of the personal characteristic data, the server master key component SS-MKC, the mobile intelligent terminal password The public key P M of the component and the number of PPD attempts are combined to generate (HPPD||SS-MKC|| PM ||PPD attempts) using the server-side password component storage key K S to encrypt, and the encrypted result is encrypted by the user The ID is an index stored in the key container; among them, the number of PPD attempts is a value used to reflect the number of times the user attempts to input personal characteristic information.
基于上述任一本发明实施例,所述服务端主密钥分量传输模块包括:Based on any of the above embodiments of the present invention, the server master key component transmission module includes:
合并与签名单元,用于所述服务端密码组件将随机数R、服务端主密钥分量SS-MKC、用户ID合并生成的(R||MKC||用户ID)使用服务端密码组件自身密钥dS签名,得到rs1;The merging and signing unit is used for the random number R, the server master key component SS-MKC, and the user ID to be generated by the server cipher component (R||MKC||user ID), which is encrypted by the server cipher component itself. The key d S is signed, and rs 1 is obtained;
加密单元,用于所述服务端密码组件将(R||MKC||用户ID||rs1)使用另一随机生成的密钥rMs加密,得到C1s,并将该密钥rMs使用移动智能终端密码组件的公钥PM加密得到C2s;an encryption unit, used for the server-side cipher component to encrypt (R||MKC||user ID||rs 1 ) with another randomly generated key r Ms to obtain C 1s , and use the key r Ms C 2s is obtained by encrypting the public key PM of the cryptographic component of the mobile intelligent terminal;
传输单元,用于所述服务端密码组件将C2s||C1s发送给所述移动智能终端密码组件;a transmission unit, used for the server cipher component to send C 2s ||C 1s to the mobile intelligent terminal cipher component;
解密单元,用于所述移动智能终端密码组件使用其自身的私钥dM解密C2s,得到rMs,然后使用rMs解密C1s,得到(R||MKC||用户ID||rs1);A decryption unit, used for the mobile intelligent terminal cryptographic component to decrypt C 2s using its own private key d M to obtain r Ms , and then use r Ms to decrypt C 1s to obtain (R||MKC||user ID||rs 1 );
验签单元,用于所述移动智能终端密码组件签名验签rs1;a signature verification unit, used for signature verification rs 1 of the cryptographic component of the mobile intelligent terminal;
存储单元,用于所述移动智能终端密码组件保存用户ID作为移动智能终端密码组件的标识。A storage unit, used for the smart mobile terminal password component to store the user ID as the identification of the mobile smart terminal password component.
第六方面,本发明实施例提供一种敏感安全数据解密装置,用于对采用所述敏感安全数据加密装置加密的敏感安全数据进行解密,包括:In a sixth aspect, an embodiment of the present invention provides a sensitive security data decryption device for decrypting sensitive security data encrypted by the sensitive security data encryption device, including:
待验证的移动智能终端个人特征数据传输模块,用于移动智能终端密码组件将所获得的待验证的移动智能终端个人特征数据传输给服务端密码组件;The personal characteristic data transmission module of the mobile intelligent terminal to be verified is used for the mobile intelligent terminal password component to transmit the obtained personal characteristic data of the mobile intelligent terminal to be verified to the server password component;
移动智能终端个人数据验证成功模块,用于所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对一致;The mobile intelligent terminal personal data verification success module is used for the server cipher component to extract the stored personal characteristic data of the mobile intelligent terminal and the server master key component from the key container, and the personal characteristics of the mobile intelligent terminal to be verified. The data is checked and consistent with the stored personal data of the mobile smart terminal;
服务端主密钥分量传输模块,用于所述服务端主密钥分量传输到所述移动智能终端密码组件;a server-side master key component transmission module, used for transmitting the server-side master key component to the mobile intelligent terminal cryptographic component;
主密钥生成模块,用于基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成装置生成主密钥;a master key generation module for generating a master key by using the master key generation device based on the personal characteristic data of the mobile intelligent terminal and the server master key component;
解密模块,用于从密钥容器中获取加密后的敏感安全数据,采用主密钥对该加密后的敏感安全数据进行解密,得到未经加密的敏感安全数据。The decryption module is used to obtain the encrypted sensitive security data from the key container, and use the master key to decrypt the encrypted sensitive security data to obtain unencrypted sensitive security data.
基于上述任一本发明实施例,还包括:移动智能终端个人数据验证失败模块,用于所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对不一致,将所述服务端主密钥分量清零,所述移动智能终端密码组件识别出所述服务端主密钥分量的值为零时提示失败,结束操作。Based on any of the above embodiments of the present invention, it further includes: a mobile intelligent terminal personal data verification failure module, used by the server-side cryptographic component to extract the stored personal characteristic data of the mobile intelligent terminal and the server-side master key from the key container component, the personal characteristic data of the mobile intelligent terminal to be verified is inconsistent with the stored personal data of the mobile intelligent terminal, the component of the server master key is cleared, and the mobile intelligent terminal password component identifies the When the value of the server's master key component is zero, it will prompt failure and end the operation.
基于上述任一本发明实施例,所述待验证的移动智能终端个人特征数据传输模块包括:Based on any of the above embodiments of the present invention, the personal characteristic data transmission module of the mobile intelligent terminal to be verified includes:
请求验证单元,用于所述移动智能终端密码组件向所述服务端密码组件请求移动智能终端个人特征数据验证;a request verification unit, used for the mobile intelligent terminal password component to request the mobile intelligent terminal personal characteristic data verification from the server password component;
传输单元,用于所述服务端密码组件发送随机数R给所述移动智能终端密码组件;a transmission unit, used for the server cipher component to send a random number R to the mobile intelligent terminal cipher component;
合并与加密单元,用于所述移动智能终端密码组件将随机数R、用户ID、待验证的移动智能终端个人特征数据杂凑值HPPD′进行合并,根据该合并结果(R||用户ID||HPPD′)分别随机生成密钥rM1、rM2,使用rM1加密得到C1,并将C1||rM1||rM2使用服务端密码组件的公钥PS加密,得到C2;The merging and encryption unit is used for the mobile intelligent terminal password component to merge the random number R, the user ID, and the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified, and according to the combination result (R||user ID|| HPPD′) randomly generate keys r M1 and r M2 respectively, use r M1 to encrypt to obtain C 1 , and encrypt C 1 ||r M1 ||r M2 with the public key P S of the server cryptographic component to obtain C 2 ;
传输单元,用于所述移动智能终端密码组件将数据(C2||C1)发送给服务端密码组件。A transmission unit, used for the mobile smart terminal cryptographic component to send the data (C 2 ||C 1 ) to the server-side cryptographic component.
基于上述任一本发明实施例,所述移动智能终端个人数据验证成功模块包括:Based on any of the above embodiments of the present invention, the successful module for personal data verification of the mobile intelligent terminal includes:
解密单元,用于所述服务端密码组件使用自身私钥dS解密C2,得到rM1和rM2,然后使用rM1解密C1得到(R||用户ID||HPPD′);a decryption unit, used for the server cryptographic component to decrypt C 2 using its own private key d S to obtain r M1 and r M2 , and then use r M1 to decrypt C 1 to obtain (R||user ID||HPPD');
验证成功单元,用于所述服务端密码组件根据用户ID从密钥容器中得到移动智能终端密码组件的对应数据(HPPD||MKC||PM||PPD尝试次数),并用服务端密码组件存储密钥KS解密,成功验证待验证的移动智能终端个人特征数据杂凑值HPPD′与移动智能终端个人特征数据杂凑值HPPD的一致性、PPD尝试次数。The verification success unit is used for the server-side password component to obtain the corresponding data (HPPD||MKC||PM||PPD attempts) from the key container of the mobile intelligent terminal according to the user ID, and store it in the server-side password component The key K S is decrypted to successfully verify the consistency of the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified and the hash value HPPD of the personal characteristic data of the mobile intelligent terminal, and the number of PPD attempts.
第七方面,本发明实施例提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如所述主密钥生成方法的步骤,或实现如所述敏感安全数据加密方法的步骤,或实现如所述敏感安全数据解密方法的步骤。In a seventh aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored in the memory and running on the processor, the processor implementing the master secret when executing the program. The steps of the key generation method, or the steps of implementing the method for encrypting sensitive security data, or the steps for implementing the method for decrypting sensitive security data.
第八方面,本发明实施例提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如所述主密钥生成方法的步骤,或实现如所述敏感安全数据加密方法的步骤,或实现如所述敏感安全数据解密方法的步骤。In an eighth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of the master key generation method described above, or implements the steps of the master key generation method as described above. The steps of the sensitive security data encryption method, or the steps of implementing the sensitive security data decryption method.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.
图1为现有技术中移动智能终端密码组件以及服务器端密码组件的结构示意图;Fig. 1 is the structural representation of the mobile intelligent terminal password component and the server-side password component in the prior art;
图2为本发明实施例提供的主密钥生成方法的流程图;2 is a flowchart of a method for generating a master key provided by an embodiment of the present invention;
图3为本发明实施例提供的敏感安全数据加密方法的流程图;3 is a flowchart of a sensitive security data encryption method provided by an embodiment of the present invention;
图4为本发明实施例提供的移动智能终端密码组件初始化过程的示意图;4 is a schematic diagram of an initialization process of a password component of a mobile smart terminal provided by an embodiment of the present invention;
图5为本发明实施例提供的敏感安全数据解密方法的流程图;5 is a flowchart of a method for decrypting sensitive security data provided by an embodiment of the present invention;
图6为本发明实施例提供的移动智能终端个人特征数据验证的流程图;6 is a flowchart of personal feature data verification of a mobile intelligent terminal provided by an embodiment of the present invention;
图7为本发明实施例提供的主密钥生成装置的结构图;7 is a structural diagram of an apparatus for generating a master key provided by an embodiment of the present invention;
图8为本发明实施例提供的敏感安全数据加密装置的结构图;8 is a structural diagram of a sensitive security data encryption device provided by an embodiment of the present invention;
图9为本发明实施例提供的敏感安全数据解密装置的结构图;9 is a structural diagram of an apparatus for decrypting sensitive security data provided by an embodiment of the present invention;
图10示例了一种电子设备的实体结构示意图。FIG. 10 illustrates a schematic diagram of the physical structure of an electronic device.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
为了便于理解,在对本发明实施例做详细说明前,对移动通信过程中与密码生成与管理有关的移动智能终端密码组件(MST-CC,Mobile Smart Terminal-CryptographyComponents)以及服务器端密码组件(SS-CC,Server Side-Cryptography Components)做一说明。For ease of understanding, before the detailed description of the embodiments of the present invention, the mobile smart terminal cryptography components (MST-CC, Mobile Smart Terminal-Cryptography Components) and server-side cryptography components (SS-CC) related to password generation and management in the process of mobile communication CC, Server Side-Cryptography Components) to explain.
图1为移动智能终端密码组件以及服务器端密码组件的示意图。如图1所示,移动智能终端密码组件至少包括:第一密码算法实现单元、个人特征数据(PPD,PersonalProfile Data)管理单元、主密钥(MK,Master Key)生成单元、服务器端密码组件通信单元以及移动智能终端密码组件服务接口;其中,所述第一密码算法实现单元用于实现密码算法;所述个人特征数据管理单元用于实现移动智能终端个人特征数据(MST-PPD,MobileSmart Terminal-Personal Profile Data)的输入及验证;主密钥生成单元用于生成主密钥;服务器端密码组件通信单元负责与服务器端密码组件建立安全通信连接,其中预置服务器端密码组件公钥;移动智能终端密码组件服务接口是移动智能终端密码组件与移动应用的接口,它至少包括数据接口、控制接口及状态输出接口。FIG. 1 is a schematic diagram of a mobile smart terminal cryptographic component and a server-side cryptographic component. As shown in Figure 1, the mobile intelligent terminal cryptographic component at least includes: a first cryptographic algorithm implementation unit, a personal profile data (PPD, PersonalProfile Data) management unit, a master key (MK, Master Key) generation unit, server-side cryptographic component communication unit and mobile intelligent terminal password component service interface; wherein, the first password algorithm implementation unit is used to realize the password algorithm; the personal characteristic data management unit is used to realize the mobile intelligent terminal personal characteristic data (MST-PPD, MobileSmart Terminal- The input and verification of Personal Profile Data); the master key generation unit is used to generate the master key; the server-side cipher component communication unit is responsible for establishing a secure communication connection with the server-side cipher component, wherein the server-side cipher component public key is preset; The terminal cryptographic component service interface is the interface between the mobile intelligent terminal cryptographic component and the mobile application, which at least includes a data interface, a control interface and a status output interface.
服务器端密码组件至少包括:第二密码算法实现单元、个人识别码(PIN,PersonalIdentification Number)管理单元、密钥容器、移动智能终端密码组件管理单元、移动智能终端密码组件通信单元;其中,第二密码算法实现单元用于实现核准的密码算法,如SM2、SM3、SM4;个人识别码管理单元用于负责密码主管PIN码验证,启动服务器端密码组件;密钥容器用于存储管理敏感安全参数的文件,服务器端密码组件中的敏感安全参数均加密存储在密钥容器中,密钥容器只有在密码主管PIN码验证通过后方可使用;移动智能终端密码组件管理单元用于完成移动智能终端个人特征数据的验证和服务端主密钥分量(SS-MKC,Server Side-Master Key Component)的生成;移动智能终端密码组件通信单元用于提供与移动智能终端密码组件的通信连接接口。The server-side cryptographic component at least includes: a second cryptographic algorithm implementation unit, a personal identification number (PIN, PersonalIdentification Number) management unit, a key container, a mobile smart terminal cryptographic component management unit, and a mobile smart terminal cryptographic component communication unit; The cryptographic algorithm implementation unit is used to implement approved cryptographic algorithms, such as SM2, SM3, and SM4; the personal identification code management unit is used to verify the PIN code of the password supervisor and start the server-side cryptographic component; the key container is used to store and manage sensitive security parameters. Files and sensitive security parameters in the server-side password component are encrypted and stored in the key container, and the key container can only be used after the password supervisor PIN code verification is passed; the mobile intelligent terminal password component management unit is used to complete the personal characteristics of the mobile intelligent terminal Data verification and Server Side-Master Key Component (SS-MKC, Server Side-Master Key Component) generation; the mobile intelligent terminal cryptographic component communication unit is used to provide a communication connection interface with the mobile intelligent terminal cryptographic component.
在移动通信过程中,移动智能终端密码组件、服务器端密码组件之间能够信息交换;移动智能终端的移动应用通过移动智能终端密码组件软件开发工具包(MST-CC SDK,Mobile Smart Terminal-Cryptography Components Software Development Kit)调用移动智能终端密码组件的软件接口;移动智能终端密码组件运行在操作系统独立的进程空间,移动应用通过操作系统进程间通信机制与移动智能终端密码组件进行信息交换。In the process of mobile communication, information can be exchanged between the mobile smart terminal cryptographic components and the server-side cryptographic components; Software Development Kit) invokes the software interface of the mobile smart terminal cryptographic component; the mobile smart terminal cryptographic component runs in a process space independent of the operating system, and the mobile application exchanges information with the mobile smart terminal cryptographic component through the operating system inter-process communication mechanism.
以上是对移动通信过程中位于移动智能终端的移动智能终端密码组件、位于服务器端的服务器端密码组件的描述。The above is the description of the mobile intelligent terminal password component located in the mobile intelligent terminal and the server-side password component located in the server side in the process of mobile communication.
在前述移动智能终端密码组件、服务端密码组件的基础上,本发明实施例提供了一种主密钥生成方法。图2为本发明实施例提供的主密钥生成方法的流程图,如图2所示,该方法包括:Based on the aforementioned mobile intelligent terminal cryptographic components and server cryptographic components, the embodiments of the present invention provide a method for generating a master key. FIG. 2 is a flowchart of a method for generating a master key provided by an embodiment of the present invention. As shown in FIG. 2 , the method includes:
步骤201、将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥。Step 201: Combine the personal characteristic data of the mobile intelligent terminal with the server master key component, and generate a master key based on the combined result.
在本发明实施例中,所述移动智能终端个人特征数据为用户个人设置的密码、用户的指纹、掌纹、面部特征等具有明显个人特征的数据,在本发明其他实施例中还可以是本领域技术人员能够想到的其他个人特征数据。所述移动智能终端个人特征数据由移动智能终端密码组件获取,获取方式可以是用户通过移动智能终端设备的输入界面实时输入,也可以是用户预先存储在移动智能终端设备中。In the embodiment of the present invention, the personal characteristic data of the mobile intelligent terminal is data with obvious personal characteristics such as the password set by the user, the user's fingerprint, palm print, facial features, etc. In other embodiments of the present invention, it may also be the present Other personal characteristic data will occur to those skilled in the art. The personal characteristic data of the mobile intelligent terminal is acquired by the mobile intelligent terminal password component, and the acquisition method may be real-time input by the user through the input interface of the mobile intelligent terminal device, or pre-stored in the mobile intelligent terminal device by the user.
在本发明实施例中,所述服务端主密钥分量可以是一随机生成的随机数。所述服务端主密钥分量由服务端密码组件生成。In this embodiment of the present invention, the server master key component may be a randomly generated random number. The server-side master key component is generated by the server-side cryptographic component.
在本发明实施例中,对移动智能终端个人特征数据与服务端主密钥分量组合后的结果采用密钥派生算法(KDA,Key Derivation Algorithms)进行计算,生成主密钥。In the embodiment of the present invention, a key derivation algorithm (KDA, Key Derivation Algorithms) is used to calculate the result of combining the personal characteristic data of the mobile intelligent terminal and the server master key component to generate the master key.
在本发明实施例中,对移动智能终端个人特征数据与服务端主密钥分量进行组合并生成主密钥的操作是在移动智能终端的移动智能终端密码组件中实现的。所述服务端主密钥分量在服务端密码组件上生成后从服务端密码组件传输到移动智能终端密码组件,在传输过程中,对待传输的服务端主密钥分量进行加解密操作,以提高数据传输的安全性。In the embodiment of the present invention, the operation of combining the personal characteristic data of the mobile intelligent terminal with the server master key component and generating the master key is implemented in the mobile intelligent terminal password component of the mobile intelligent terminal. After the server master key component is generated on the server cipher component, it is transmitted from the server cipher component to the mobile intelligent terminal cipher component. During the transmission process, the server master key component to be transmitted is encrypted and decrypted to improve Security of data transmission.
本发明实施例所公开的主密钥生成方法在生成主密钥时既采用了移动智能终端的移动智能终端个人特征数据,又采用了服务端的服务端主密钥分量,主密钥的生成不依赖于通信一端的数据,能有效地提高主密钥的安全性。The master key generation method disclosed in the embodiment of the present invention uses both the mobile intelligent terminal personal characteristic data of the mobile intelligent terminal and the server master key component of the server when generating the master key. Relying on the data at one end of the communication can effectively improve the security of the master key.
基于上述任一本发明实施例,图3为本发明实施例提供的敏感安全数据加密方法的流程图,如图3所示,本发明实施例提供的敏感安全数据加密方法包括:Based on any of the above embodiments of the present invention, FIG. 3 is a flowchart of a method for encrypting sensitive security data provided by an embodiment of the present invention. As shown in FIG. 3 , the method for encrypting sensitive security data provided by an embodiment of the present invention includes:
步骤301、移动智能终端密码组件将所获得的移动智能终端个人特征数据传输给所述服务端密码组件;Step 301: The mobile intelligent terminal password component transmits the obtained personal characteristic data of the mobile intelligent terminal to the server password component;
步骤302、服务端密码组件将所生成的服务端主密钥分量与所接收的移动智能终端个人特征数据保存在密钥容器中;
步骤303、移动智能终端密码组件从服务端密码组件接收服务端主密钥分量;
步骤304、采用前述的主密钥生成方法生成主密钥,即:将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥;
步骤305、利用主密钥对敏感安全数据进行加密,然后将加密后的敏感安全数据保存在服务端密码组件的密钥容器中。Step 305: Encrypt the sensitive security data with the master key, and then save the encrypted sensitive security data in the key container of the server-side cryptographic component.
本发明实施例所公开的敏感安全数据加密方法基于移动智能终端个人特征数据以及服务端主密钥分量来生成主密钥、通过该主密钥对敏感安全数据进行加密,并且将服务端主密钥分量、移动智能终端个人特征数据、利用主密钥加密的敏感安全数据(如移动智能终端密码组件的私钥)都保存在密钥容器中,极大地增加了敏感安全数据的安全性。The sensitive security data encryption method disclosed in the embodiment of the present invention generates a master key based on the personal characteristic data of the mobile intelligent terminal and the server master key component, encrypts the sensitive security data by using the master key, and encrypts the server master key The key components, the personal characteristic data of the smart mobile terminal, and the sensitive security data encrypted with the master key (such as the private key of the cryptographic component of the smart mobile terminal) are all stored in the key container, which greatly increases the security of the sensitive security data.
基于上述任一本发明实施例,本发明另一实施例提供的敏感安全数据加密方法对图3所示敏感安全数据加密方法的相关步骤做了进一步扩充;其中,所述步骤301进一步包括:Based on any of the above embodiments of the present invention, the sensitive security data encryption method provided by another embodiment of the present invention further expands the relevant steps of the sensitive security data encryption method shown in FIG. 3; wherein, the
所述服务端密码组件取得随机数R后,将所述随机数R发送给所述移动智能终端密码组件;After the server cryptographic component obtains the random number R, it sends the random number R to the mobile intelligent terminal cryptographic component;
所述移动智能终端密码组件生成自身的公私钥对(PM、Dm),计算移动智能终端个人特征数据的杂凑值HPPD;The mobile intelligent terminal cryptographic component generates its own public-private key pair (PM, Dm), and calculates the hash value HPPD of the personal characteristic data of the mobile intelligent terminal;
所述移动智能终端密码组件将随机数R、个人特征数据的杂凑值HPPD以及移动智能终端密码组件的公钥PM的合并值(R||HPPD||PM)使用随机生成的密钥rM加密,得到C1,使用服务端密码组件的公钥PS对所述随机生成的密钥rM加密得到C2;其中,||表示合并;The cryptographic component of the mobile smart terminal encrypts the random number R, the hash value HPPD of the personal characteristic data, and the combined value (R||HPPD||PM) of the public key PM of the cryptographic component of the mobile smart terminal with a randomly generated key rM, C1 is obtained, and C2 is obtained by encrypting the randomly generated key rM with the public key PS of the server-side cryptographic component; wherein, || represents a combination;
所述移动智能终端密码组件将数据C2||C1发送给服务端密码组件。The mobile intelligent terminal cryptographic component sends the data C2||C1 to the server-side cryptographic component.
所述步骤302进一步包括:The
所述服务端密码组件接收数据C2||C1,然后使用自身私钥dS解密C2,得到随机生成的密钥rM,然后使用rM解密C1,得到(R||HPPD||PM);The server-side cryptographic component receives data C2||C1, then decrypts C2 using its own private key dS to obtain a randomly generated key rM, and then uses rM to decrypt C1 to obtain (R||HPPD||PM);
所述服务端密码组件生成用户ID、生成服务端主密钥分量SS-MKC,然后将个人特征数据的杂凑值HPPD、服务端主密钥分量SS-MKC、移动智能终端密码组件的公钥PM、PPD尝试次数合并生成的(HPPD||SS-MKC||PM||PPD尝试次数)使用服务端密码组件存储密钥KS进行加密,将加密得到的结果以用户ID为索引存储在密钥容器中;其中,PPD尝试次数是一个用来反映用户尝试输入个人特征信息次数的值。The server cipher component generates a user ID, generates a server master key component SS-MKC, and then combines the hash value HPPD of the personal feature data, the server master key component SS-MKC, and the public key PM of the mobile intelligent terminal cipher component. , the number of PPD attempts (HPPD||SS-MKC||PM||PPD attempts) is encrypted using the server-side password component storage key KS, and the encrypted result is stored in the key container with the user ID as the index Among them, the number of PPD attempts is a value used to reflect the number of times the user attempts to input personal characteristic information.
所述步骤303进一步包括:The
所述服务端密码组件将随机数R、服务端主密钥分量SS-MKC、用户ID合并生成的(R||MKC||用户ID)使用服务端密码组件自身密钥dS签名,得到rs1;The server-side cipher component combines the random number R, the server-side master key component SS-MKC, and the user ID to generate (R||MKC||user ID) and signs it with the server-side cipher component's own key d S to obtain rs 1 ;
所述服务端密码组件将(R||MKC||用户ID||rs1)使用另一随机生成的密钥rMs加密,得到C1s,并将该密钥rMs使用移动智能终端密码组件的公钥PM加密得到C2s;The server-side cipher component encrypts (R||MKC||user ID||rs 1 ) with another randomly generated key r Ms to obtain C 1s , and uses the key r Ms with the mobile smart terminal cipher component The public key PM encrypts to obtain C 2s ;
所述服务端密码组件将C2s||C1s发送给所述移动智能终端密码组件;The server-side cryptographic component sends C 2s || C 1s to the mobile intelligent terminal cryptographic component;
所述移动智能终端密码组件使用其自身的私钥dM解密C2s,得到rMs,然后使用rMs解密C1s,得到(R||MKC||用户ID||rs1);The mobile intelligent terminal cryptographic component uses its own private key d M to decrypt C 2s to obtain r Ms , and then uses r Ms to decrypt C 1s to obtain (R||MKC||user ID||rs 1 );
所述移动智能终端密码组件签名验签rs1;The mobile intelligent terminal cryptographic component signature verification rs1 ;
所述移动智能终端密码组件保存用户ID作为移动智能终端密码组件的标识。The mobile intelligent terminal password component stores the user ID as the identification of the mobile intelligent terminal password component.
本发明实施例所提供的敏感安全数据加密方法进一步引入了安全机制,通过对移动智能终端个人特征数据、服务端主密钥分量在传输过程中的加密,进一步保证了数据的安全性。The sensitive security data encryption method provided by the embodiment of the present invention further introduces a security mechanism, and further ensures data security by encrypting the personal characteristic data of the mobile intelligent terminal and the server master key component during the transmission process.
本发明实施例提供的敏感安全数据加密方法能应用于移动通信领域,如移动智能终端密码组件在首次运行时需要对移动智能终端密码组件进行初始化,在初始化过程中需要采用敏感安全数据加密方法。下面对移动智能终端密码组件的初始化过程进行详细说明。The sensitive security data encryption method provided by the embodiment of the present invention can be applied to the field of mobile communication. For example, the mobile smart terminal cryptographic component needs to be initialized when it runs for the first time, and the sensitive security data encryption method needs to be used in the initialization process. The initialization process of the password component of the mobile smart terminal will be described in detail below.
移动智能终端密码组件在发布时通常内置有服务端密码组件的公钥PS;在移动智能终端密码组件初始化开始时,用户应当已经输入了个人特征数据,服务端密码组件应当已经启动,且已由密码主管PIN码生成服务端密码组件存储密钥KS。When the mobile smart terminal cryptographic component is released, the public key PS of the server-side cryptographic component is usually built in; when the initialization of the mobile smart terminal cryptographic component starts, the user should have entered personal characteristic data, the server-side cryptographic component should have been started, and the The password supervisor PIN code generation server password component stores the key KS.
图4为移动智能终端密码组件初始化过程的示意图,基本步骤如下:Fig. 4 is the schematic diagram of the initialization process of the password component of the mobile intelligent terminal, and the basic steps are as follows:
步骤401、移动智能终端密码组件自检;Step 401, self-check of the password component of the mobile smart terminal;
步骤402、移动智能终端密码组件向服务端密码组件请求初始化;Step 402, the mobile intelligent terminal cryptographic component requests initialization from the server-side cryptographic component;
步骤403、服务端密码组件取得随机数R后发送移动智能终端密码组件;Step 403: After obtaining the random number R, the server cipher component sends the mobile intelligent terminal cipher component;
步骤404、移动智能终端密码组件生成移动智能终端密码组件的公私钥对(PM、dM),计算个人特征数据(PPD)的杂凑值HPPD;Step 404, the mobile smart terminal cryptographic component generates a public-private key pair (PM, dM) of the mobile smart terminal cryptographic component, and calculates the hash value HPPD of the personal characteristic data (PPD);
步骤405、移动智能终端密码组件将随机数R、个人特征数据的杂凑值HPPD以及移动智能终端密码组件的公钥PM的合并值(R||HPPD||PM)使用随机生成的密钥rM加密,得到C1,使用服务端密码组件的公钥PS对前述随机生成的密钥rM加密得到C2;其中,||表示合并;Step 405: The random number R, the hash value HPPD of the personal characteristic data, and the combined value (R||HPPD||P M ) of the public key PM of the cryptographic component of the mobile intelligent terminal are randomly generated by the cryptographic component of the mobile intelligent terminal r M is encrypted to obtain C 1 , and C 2 is obtained by encrypting the aforementioned randomly generated key r M by using the public key P S of the cryptographic component of the server;
步骤406、移动智能终端密码组件将数据C2||C1发送给服务端密码组件;Step 406, the mobile smart terminal cryptographic component sends the data C 2 ||C 1 to the server-side cryptographic component;
步骤407、服务端密码组件接收数据C2||C1,然后使用自身私钥dS解密C2,得到随机生成的密钥rM,然后使用rM解密C1,得到(R||HPPD||PM);Step 407: The server-side cryptographic component receives the data C 2 ||C 1 , then decrypts C 2 using its own private key d S to obtain a randomly generated key r M , and then uses r M to decrypt C 1 to obtain (R||HPPD ||P M );
步骤408、服务端密码组件生成用户ID、生成服务端主密钥分量SS-MKC(简称MKC),然后将个人特征数据的杂凑值HPPD、服务端主密钥分量SS-MKC、移动智能终端密码组件的公钥PM、PPD尝试次数合并生成的(HPPD||MKC||PM||PPD尝试次数)使用服务端密码组件存储密钥KS进行加密,将加密得到的结果以用户ID为索引存储在密钥容器中;其中,PPD尝试次数是一个用来反映用户尝试输入个人特征信息次数的值;Step 408, the server password component generates a user ID, generates a server master key component SS-MKC (referred to as MKC), and then combines the hash value HPPD of the personal feature data, the server master key component SS-MKC, and the mobile intelligent terminal password. The component's public key PM and PPD attempts are combined to generate (HPPD||MKC||PM ||PPD attempts ) using the server-side password component storage key K S for encryption, and the encrypted result is indexed by the user ID Stored in the key container; wherein, the number of PPD attempts is a value used to reflect the number of times the user attempts to enter personal characteristic information;
步骤409、服务端密码组件将随机数R、服务端主密钥分量SS-MKC、用户ID合并生成的(R||MKC||用户ID)使用服务端密码组件自身密钥dS签名,得到rs1;Step 409: The server cipher component combines the random number R, the server master key component SS-MKC, and the user ID to generate (R||MKC||user ID) and signs it with the server cipher component's own key d S to obtain rs1 ;
步骤410、服务端密码组件将(R||MKC||用户ID||rs1)使用另一随机生成的密钥rMs加密,得到C1s,并将该密钥rMs使用移动智能终端密码组件的公钥PM加密得到C2s;Step 410: The server-side password component encrypts (R||MKC||user ID||rs 1 ) with another randomly generated key r Ms to obtain C 1s , and uses the mobile smart terminal password for the key r Ms The public key PM of the component is encrypted to obtain C 2s ;
步骤411、服务端密码组件将C2s||C1s发送给移动智能终端密码组件;Step 411: The server-side cryptographic component sends C 2s ||C 1s to the mobile intelligent terminal cryptographic component;
步骤412、移动智能终端密码组件使用其自身的私钥dM解密C2s,得到rMs,然后使用rMs解密C1s,得到(R||MKC||用户ID||rs1);Step 412, the mobile intelligent terminal cryptographic component decrypts C 2s using its own private key d M to obtain r Ms , and then uses r Ms to decrypt C 1s to obtain (R||MKC||user ID||rs 1 );
步骤413、移动智能终端密码组件签名验签rs1;Step 413, mobile intelligent terminal cryptographic component signature verification rs1 ;
步骤414、移动智能终端密码组件保存用户ID作为移动智能终端密码组件的标识;Step 414, the mobile intelligent terminal password component saves the user ID as the identification of the mobile intelligent terminal password component;
步骤415、移动智能终端密码组件以个人特征参数PPD与服务端主密钥分量MKC的合并值(PPD||MKC)为参数,使用密钥派生算法KDF()计算,得到主密钥MK;Step 415, the mobile intelligent terminal cryptographic component takes the combined value (PPD||MKC) of the personal characteristic parameter PPD and the server master key component MKC as a parameter, uses the key derivation algorithm KDF() to calculate, and obtains the master key MK;
步骤416、移动智能终端密码组件使用主密钥MK加密敏感安全数据(如移动智能终端密码组件私钥dM),保存在密钥容器中;Step 416, the mobile intelligent terminal cipher component encrypts the sensitive security data (such as the mobile intelligent terminal cipher component private key d M ) using the master key MK, and saves it in the key container;
步骤417、移动智能终端密码组件将公钥PM输出给移动应用,初始化完成。Step 417: The cryptographic component of the mobile intelligent terminal outputs the public key PM to the mobile application, and the initialization is completed.
从上述对移动智能终端密码组件初始化过程的描述可以看出,这一过程包含了敏感安全数据加密方法的全部步骤,是敏感安全数据加密方法的一种具体应用。It can be seen from the above description of the initialization process of the password component of the mobile smart terminal that this process includes all the steps of the sensitive security data encryption method, and is a specific application of the sensitive security data encryption method.
本发明实施例还提供了对加密的敏感安全数据进行解密的方法,该加密的敏感安全数据是采用基于上述任一本发明实施例所提供的敏感安全数据加密方法加密后得到的。图5为本发明实施例提供的敏感安全数据解密方法的流程图,如图5所示,本发明实施例提供的敏感安全数据解密方法包括:The embodiment of the present invention also provides a method for decrypting encrypted sensitive security data, where the encrypted sensitive security data is obtained by encrypting the sensitive security data encryption method based on any of the above embodiments of the present invention. FIG. 5 is a flowchart of a method for decrypting sensitive security data provided by an embodiment of the present invention. As shown in FIG. 5 , the method for decrypting sensitive security data provided by an embodiment of the present invention includes:
步骤501、移动智能终端密码组件将所获得的待验证的移动智能终端个人特征数据传输给服务端密码组件;Step 501: The mobile intelligent terminal password component transmits the obtained personal characteristic data of the mobile intelligent terminal to be verified to the server password component;
步骤502、服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,然后将所述待验证的移动智能终端个人特征数据与所存储的移动智能终端个人数据进行核对,若两者不一致,将所述服务端主密钥分量清零,否则所述服务端主密钥分量的值不变;
步骤503、移动智能终端密码组件接收服务端主密钥分量,当所述服务端主密钥分量的值为零时提示失败,结束操作,否则执行下一步;
步骤504、采用前述的主密钥生成方法生成主密钥,即:将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥;
在本步骤中,由于待验证的移动智能终端个人特征数据与所存储的移动智能终端个人数据在之前的步骤中已经被验证是一致的,因此所述移动智能终端个人特征数据可以是步骤501中移动智能终端密码组件所获得的待验证的移动智能终端个人特征数据。In this step, since the personal characteristic data of the mobile intelligent terminal to be verified and the stored personal data of the mobile intelligent terminal have been verified to be consistent in the previous steps, the personal characteristic data of the mobile intelligent terminal may be the mobile intelligent terminal in
步骤505、从服务端密码组件的密钥容器中获取加密后的敏感安全数据,采用主密钥对该加密后的敏感安全数据进行解密,得到未经加密的敏感安全数据。Step 505: Obtain the encrypted sensitive security data from the key container of the cryptographic component of the server, and decrypt the encrypted sensitive security data by using the master key to obtain unencrypted sensitive security data.
本发明实施例提供的敏感安全数据解密方法基于移动智能终端个人特征数据以及服务端主密钥分量来生成主密钥、通过该主密钥对经加密的敏感安全数据进行解密,由于在生成主密钥前需要将待验证的移动智能终端个人特征数据与预先保存在密钥容器中的移动智能终端个人特征数据进行比较验证,因此能够极大地提高敏感安全数据的安全性。The sensitive security data decryption method provided by the embodiment of the present invention generates a master key based on the personal characteristic data of the mobile intelligent terminal and the server master key component, and decrypts the encrypted sensitive security data by using the master key. Before the key, it is necessary to compare and verify the personal characteristic data of the mobile intelligent terminal to be verified with the personal characteristic data of the mobile intelligent terminal stored in the key container in advance, so the security of sensitive security data can be greatly improved.
基于上述任一本发明实施例,本发明另一实施例提供的敏感安全数据解密方法对图5所示敏感安全数据解密方法的相关步骤做了进一步扩充;其中,Based on any of the above embodiments of the present invention, the sensitive security data decryption method provided by another embodiment of the present invention further expands the relevant steps of the sensitive security data decryption method shown in FIG. 5; wherein,
所述步骤501进一步包括:The
所述移动智能终端密码组件向所述服务端密码组件请求移动智能终端个人特征数据验证;The mobile intelligent terminal password component requests the mobile intelligent terminal personal characteristic data verification from the server-side password component;
所述服务端密码组件发送随机数R给所述移动智能终端密码组件;The server-side cryptographic component sends a random number R to the mobile intelligent terminal cryptographic component;
移动智能终端密码组件将随机数R、用户ID、待验证的移动智能终端个人特征数据杂凑值HPPD′进行合并,根据该合并结果(R||用户ID||HPPD′)分别随机生成密钥rM1、rM2,使用rM1加密得到C1,并将C1||rM1||rM2使用服务端密码组件的公钥PS加密,得到C2;The cryptographic component of the smart mobile terminal combines the random number R, the user ID, and the hash value HPPD' of the personal characteristic data of the smart mobile terminal to be verified, and randomly generates the key r according to the combined result (R||user ID||HPPD'). M1 and r M2 , use r M1 to encrypt to obtain C 1 , and encrypt C 1 ||r M1 ||r M2 with the public key P S of the server cipher component to obtain C 2 ;
所述移动智能终端密码组件将数据(C2||C1)发送给服务端密码组件。The mobile intelligent terminal cryptographic component sends the data (C 2 ||C 1 ) to the server-side cryptographic component.
所述步骤502进一步包括:The
所述服务端密码组件使用自身私钥dS解密C2,得到rM1和rM2,然后使用rM1解密C1得到(R||用户ID||HPPD′);The server-side cryptographic component uses its own private key d S to decrypt C 2 to obtain r M1 and r M2 , and then uses r M1 to decrypt C 1 to obtain (R||user ID||HPPD');
所述服务端密码组件根据用户ID从密钥容器中得到移动智能终端密码组件的对应数据(HPPD||MKC||PM||PPD尝试次数),并用服务端密码组件存储密钥KS解密,验证待验证的移动智能终端个人特征数据杂凑值HPPD′与移动智能终端个人特征数据杂凑值HPPD的一致性、PPD尝试次数,若验证失败,将所述服务端主密钥分量清零,若验证成功,所述服务端主密钥分量的值不变。The server cipher component obtains the corresponding data of the mobile intelligent terminal cipher component (HPPD||MKC||PM||PPD attempts) from the key container according to the user ID, and decrypts it with the server cipher component storage key K S , Verify the consistency of the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified and the hash value HPPD of the personal characteristic data of the mobile intelligent terminal, and the number of PPD attempts. If the verification fails, clear the server master key component to zero. If successful, the value of the server master key component remains unchanged.
本发明实施例所提供的敏感安全数据解密方法进一步引入了安全机制,通过对移动智能终端个人特征数据、服务端主密钥分量在传输过程中的加密,进一步保证了数据的安全性。The sensitive security data decryption method provided by the embodiment of the present invention further introduces a security mechanism, and further ensures data security by encrypting the personal characteristic data of the mobile intelligent terminal and the server master key component during the transmission process.
本发明实施例提供的敏感安全数据解密方法能应用于移动通信领域,如移动智能终端密码组件在提供密码服务前需要验证移动智能终端个人特征数据的正确性,在这一验证过程中需要采用本发明实施例提供的敏感安全数据解密方法。下面对移动智能终端个人特征数据的验证过程进行详细说明。The sensitive security data decryption method provided by the embodiment of the present invention can be applied to the field of mobile communication. For example, the password component of the mobile intelligent terminal needs to verify the correctness of the personal characteristic data of the mobile intelligent terminal before providing the password service. The sensitive security data decryption method provided by the embodiment of the invention. The verification process of the personal characteristic data of the mobile intelligent terminal will be described in detail below.
根据前述本发明实施例对移动智能终端密码组件初始化过程的描述,移动智能终端密码组件的私钥经主密钥加密后被保存在密钥容器中,因此移动智能终端密码组件在得到服务端主密钥分量从而生成主密钥前是无法得到密钥容器中自身的私钥的,需要在接收移动应用用户输入移动智能终端个人特征数据,并验证其正确性后,移动智能终端密码组件才能提供密码服务。According to the description of the initialization process of the cipher component of the mobile intelligent terminal in the foregoing embodiments of the present invention, the private key of the cipher component of the mobile intelligent terminal is encrypted by the master key and then stored in the key container. Before the key component generates the master key, the private key in the key container cannot be obtained. The mobile intelligent terminal password component can only provide the personal characteristic data of the mobile intelligent terminal input by the mobile application user and verify its correctness. password service.
在进行移动智能终端个人特征数据验证前,移动智能终端密码组件已经拥有:服务端密码组件的公钥PS、移动应用用户标识(用户ID)、待验证的移动智能终端个人特征数据杂凑值HPPD′。Before verifying the personal feature data of the smart mobile terminal, the cryptographic component of the smart mobile terminal already has: the public key PS of the cryptographic component of the server, the mobile application user ID (user ID), the hash value HPPD of the personal feature data of the smart mobile terminal to be verified '.
图6为移动智能终端个人特征数据验证的流程图,基本步骤如下:Fig. 6 is the flow chart of the personal characteristic data verification of mobile intelligent terminal, the basic steps are as follows:
步骤601、移动智能终端密码组件向服务端密码组件请求移动智能终端个人特征数据验证;Step 601, the mobile intelligent terminal password component requests the mobile intelligent terminal personal characteristic data verification from the server-side password component;
步骤602、服务端密码组件发送随机数R给移动智能终端密码组件;
步骤603、移动智能终端密码组件将随机数R、用户ID、待验证的移动智能终端个人特征数据杂凑值HPPD′进行合并,根据该合并结果(R||用户ID||HPPD′)分别随机生成密钥rM1、rM2,使用rM1加密得到C1,并将C1||rM1||rM2使用服务端密码组件的公钥PS加密,得到C2;Step 603: The mobile intelligent terminal password component merges the random number R, the user ID, and the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified, and randomly generates them according to the merged result (R||user ID||HPPD'). The keys r M1 and r M2 are encrypted using r M1 to obtain C 1 , and C 1 ||r M1 ||r M2 is encrypted with the public key P S of the server cipher component to obtain C 2 ;
步骤604、移动智能终端密码组件将数据(C2||C1)发送给服务端密码组件;Step 604: The mobile smart terminal cryptographic component sends the data (C 2 ||C 1 ) to the server-side cryptographic component;
步骤605、服务端密码组件使用自身私钥dS解密C2,得到rM1和rM2,然后使用rM1解密C1得到(R||用户ID||HPPD′);Step 605: The server-side cryptographic component decrypts C 2 using its own private key d S to obtain r M1 and r M2 , and then uses r M1 to decrypt C 1 to obtain (R||user ID||HPPD');
步骤606、服务端密码组件根据用户ID从密钥容器中得到移动智能终端密码组件的对应数据(HPPD||MKC||PM||PPD尝试次数),并用服务端密码组件存储密钥KS解密,验证待验证的移动智能终端个人特征数据杂凑值HPPD′与移动智能终端个人特征数据杂凑值HPPD的一致性、PPD尝试次数,以上条件有一不满足,则置服务端主密钥分量MKC为零(标识MST-PPD验证失败),修改PPD尝试次数;若以上条件均满足,直接执行下一步;Step 606: The server-side cipher component obtains the corresponding data (HPPD||MKC||PM||PPD attempts) from the key container according to the user ID, and decrypts it with the server-side cipher component storage key K S , verify the consistency of the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified and the hash value HPPD of the personal characteristic data of the mobile intelligent terminal, and the number of PPD attempts. If one of the above conditions is not satisfied, set the server master key component MKC to zero (Identifies MST-PPD verification failure), modify the number of PPD attempts; if the above conditions are met, go to the next step directly;
步骤607、服务端密码组件使用移动智能终端密码组件的密钥rM2加密(R||MKC||PPD尝试次数),得到C2S,并将C2S发送给移动智能终端密码组件;Step 607, the server-side cryptographic component encrypts (R||MKC||PPD attempts) with the key r M2 of the mobile smart terminal cryptographic component, obtains C 2S , and sends the C 2S to the mobile smart terminal cryptographic component;
步骤608、移动智能终端密码组件使用移动智能终端密码组件的密钥rM2解密C2S,得到(R||MKC||PPD尝试次数);如果其中的MKC为零,则返回移动智能终端个人特征数据验证失败结果,并附带PPD尝试次数;否则继续执行下一步;Step 608: The mobile intelligent terminal cipher component decrypts C 2S using the key rM2 of the mobile intelligent terminal cipher component to obtain (R||MKC||PPD attempts); if MKC is zero, return the personal characteristic data of the mobile intelligent terminal Verify the failure result with the number of PPD attempts; otherwise, continue to the next step;
步骤609、移动智能终端密码组件以(PPD||MKC)为参数,使用密钥派生算法KDF()计算得到主密钥MK,使用主密钥MK解密密钥容器中的敏感安全参数(如移动智能终端密码组件私钥dM)。Step 609: The cryptographic component of the mobile intelligent terminal takes (PPD||MKC) as a parameter, uses the key derivation algorithm KDF() to calculate the master key MK, and uses the master key MK to decrypt the sensitive security parameters in the key container (such as mobile Intelligent terminal cryptographic component private key d M ).
步骤610、移动智能终端个人特征数据验证结束。Step 610, the verification of the personal characteristic data of the mobile intelligent terminal ends.
从上述对移动智能终端个人特征数据验证过程的描述可以看出,这一过程包含了敏感安全数据解密方法的全部步骤,是敏感安全数据解密方法的一种具体应用。It can be seen from the above description of the verification process of the personal characteristic data of the mobile intelligent terminal that this process includes all the steps of the sensitive security data decryption method, and is a specific application of the sensitive security data decryption method.
基于上述任一实施例,图7为本发明实施例提供的主密钥生成装置的结构图,如图7所示,本发明实施例所提供的主密钥生成装置,包括:Based on any of the above embodiments, FIG. 7 is a structural diagram of an apparatus for generating a master key provided by an embodiment of the present invention. As shown in FIG. 7 , the apparatus for generating a master key provided by an embodiment of the present invention includes:
主密钥生成模块701,用于将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥;其中,The master
所述移动智能终端个人特征数据为与用户个人特征有关的数据,所述服务端主密钥分量为服务端密码组件生成的随机数。The personal characteristic data of the mobile intelligent terminal is data related to the personal characteristic of the user, and the server-side master key component is a random number generated by the server-side password component.
在本发明实施例中,所述基于组合后的结果生成主密钥包括:采用密钥派生算法对组合后的结果进行计算,生成主密钥。In the embodiment of the present invention, generating the master key based on the combined result includes: using a key derivation algorithm to calculate the combined result to generate the master key.
本发明实施例所公开的主密钥生成装置在生成主密钥时既采用了移动智能终端的移动智能终端个人特征数据,又采用了服务端的服务端主密钥分量,主密钥的生成不依赖于通信一端的数据,能有效地提高主密钥的安全性。The master key generation device disclosed in the embodiment of the present invention uses both the mobile intelligent terminal personal characteristic data of the mobile intelligent terminal and the server master key component of the server when generating the master key. Relying on the data at one end of the communication can effectively improve the security of the master key.
基于上述任一实施例,图8为本发明实施例提供的敏感安全数据加密装置的结构图,如图8所示,本发明实施例所提供的敏感安全数据加密装置,包括:Based on any of the above embodiments, FIG. 8 is a structural diagram of an apparatus for encrypting sensitive security data provided by an embodiment of the present invention. As shown in FIG. 8 , the apparatus for encrypting sensitive security data provided by an embodiment of the present invention includes:
移动智能终端个人特征数据传输模块801,用于移动智能终端密码组件将所获得的移动智能终端个人特征数据传输给服务端密码组件;The mobile intelligent terminal personal characteristic data transmission module 801 is used for the mobile intelligent terminal password component to transmit the obtained mobile intelligent terminal personal characteristic data to the server password component;
服务端主密钥分量与移动智能终端个人特征数据存储模块802,用于所述服务端密码组件将所生成的服务端主密钥分量与所接收的所述移动智能终端个人特征数据保存在密钥容器中;The server-side master key component and the mobile intelligent terminal personal characteristic data storage module 802 is used for the server-side cipher component to store the generated server-side master key component and the received personal characteristic data of the mobile intelligent terminal in a password. key container;
服务端主密钥分量传输模块803,用于所述移动智能终端密码组件从所述服务端密码组件接收所述服务端主密钥分量;a server-side master key component transmission module 803, used for the mobile smart terminal cryptographic component to receive the server-side master key component from the server-side cryptographic component;
主密钥生成模块804,用于基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用前一本发明实施例所述的主密钥生成装置生成主密钥;The master key generation module 804 is configured to use the master key generation device described in the previous embodiment of the present invention to generate a master key based on the personal characteristic data of the mobile intelligent terminal and the server master key component;
加密模块805,用于采用所述主密钥对敏感安全数据进行加密,将加密后的敏感安全数据保存在所述密钥容器中。The encryption module 805 is configured to encrypt the sensitive security data by using the master key, and store the encrypted sensitive security data in the key container.
本发明实施例所公开的敏感安全数据加密装置基于移动智能终端个人特征数据以及服务端主密钥分量来生成主密钥、通过该主密钥对敏感安全数据进行加密,并且将服务端主密钥分量、移动智能终端个人特征数据、利用主密钥加密的敏感安全数据(如移动智能终端密码组件的私钥)都保存在密钥容器中,极大地增加了敏感安全数据的安全性。The sensitive security data encryption device disclosed in the embodiment of the present invention generates a master key based on the personal characteristic data of the mobile intelligent terminal and the server master key component, encrypts the sensitive security data by using the master key, and encrypts the server master key The key components, the personal characteristic data of the smart mobile terminal, and the sensitive security data encrypted with the master key (such as the private key of the cryptographic component of the smart mobile terminal) are all stored in the key container, which greatly increases the security of the sensitive security data.
基于上述任一本发明实施例,本发明另一实施例提供的敏感安全数据加密装置对图8所示敏感安全数据加密装置相关模块的功能做了进一步扩充;其中,Based on any of the above embodiments of the present invention, the sensitive security data encryption device provided by another embodiment of the present invention further expands the functions of the relevant modules of the sensitive security data encryption device shown in FIG. 8 ; wherein,
所述移动智能终端个人特征数据传输模块包括:The personal characteristic data transmission module of the mobile intelligent terminal includes:
随机数生成与传输单元,用于所述服务端密码组件取得随机数R后,将所述随机数R发送给所述移动智能终端密码组件;a random number generation and transmission unit, configured to send the random number R to the mobile smart terminal cryptographic component after the server-side cryptographic component obtains the random number R;
密钥对与杂凑值生成单元,用于所述移动智能终端密码组件生成自身的公私钥对(PM、Dm),计算移动智能终端个人特征数据的杂凑值HPPD;a key pair and hash value generation unit, used for the mobile intelligent terminal cryptographic component to generate its own public and private key pair (P M , D m ), and to calculate the hash value HPPD of the personal characteristic data of the mobile intelligent terminal;
合并与加密单元,用于所述移动智能终端密码组件将随机数R、个人特征数据的杂凑值HPPD以及移动智能终端密码组件的公钥PM的合并值(R||HPPD||PM)使用随机生成的密钥rM加密,得到C1,使用服务端密码组件的公钥PS对所述随机生成的密钥rM加密得到C2;其中,||表示合并;A merging and encrypting unit, used for the random number R, the hash value HPPD of the personal characteristic data, and the combined value ( R ||HPPD|| PM ) of the public key PM of the cryptographic component of the mobile intelligent terminal Use the randomly generated key r M to encrypt to obtain C 1 , and use the public key P S of the server cipher component to encrypt the randomly generated key r M to obtain C 2 ; where || represents a combination;
传输单元,用于所述移动智能终端密码组件将数据C2||C1发送给服务端密码组件。A transmission unit, used for the mobile smart terminal cryptographic component to send the data C 2 ||C 1 to the server-side cryptographic component.
所述服务端主密钥分量与移动智能终端个人特征数据存储模块包括:The server master key component and the mobile intelligent terminal personal characteristic data storage module include:
解密单元,用于所述服务端密码组件接收数据C2||C1,然后使用自身私钥dS解密C2,得到随机生成的密钥rM,然后使用rM解密C1,得到(R||HPPD||PM);A decryption unit, used for the server cipher component to receive data C 2 ||C 1 , and then use its own private key d S to decrypt C 2 to obtain a randomly generated key r M , and then use r M to decrypt C 1 to obtain ( R||HPPD||P M );
存储单元,用于所述服务端密码组件生成用户ID、生成服务端主密钥分量SS-MKC,然后将个人特征数据的杂凑值HPPD、服务端主密钥分量SS-MKC、移动智能终端密码组件的公钥PM、PPD尝试次数合并生成的(HPPD||SS-MKC||PM||PPD尝试次数)使用服务端密码组件存储密钥KS进行加密,将加密得到的结果以用户ID为索引存储在密钥容器中;其中,PPD尝试次数是一个用来反映用户尝试输入个人特征信息次数的值。The storage unit is used for the server cipher component to generate the user ID, the server master key component SS-MKC, and then the hash value HPPD of the personal characteristic data, the server master key component SS-MKC, the mobile intelligent terminal password The public key P M of the component and the number of PPD attempts are combined to generate (HPPD||SS-MKC|| PM ||PPD attempts) using the server-side password component storage key K S to encrypt, and the encrypted result is encrypted by the user The ID is an index stored in the key container; among them, the number of PPD attempts is a value used to reflect the number of times the user attempts to input personal characteristic information.
所述服务端主密钥分量传输模块包括:The server master key component transmission module includes:
合并与签名单元,用于所述服务端密码组件将随机数R、服务端主密钥分量SS-MKC、用户ID合并生成的(R||MKC||用户ID)使用服务端密码组件自身密钥dS签名,得到rs1;The merging and signing unit is used for the random number R, the server master key component SS-MKC, and the user ID to be generated by the server cipher component (R||MKC||user ID), which is encrypted by the server cipher component itself. The key d S is signed, and rs 1 is obtained;
加密单元,用于所述服务端密码组件将(R||MKC||用户ID||rs1)使用另一随机生成的密钥rMs加密,得到C1s,并将该密钥rMs使用移动智能终端密码组件的公钥PM加密得到C2s;an encryption unit, used for the server-side cipher component to encrypt (R||MKC||user ID||rs 1 ) with another randomly generated key r Ms to obtain C 1s , and use the key r Ms C 2s is obtained by encrypting the public key PM of the cryptographic component of the mobile intelligent terminal;
传输单元,用于所述服务端密码组件将C2s||C1s发送给所述移动智能终端密码组件;a transmission unit, used for the server cipher component to send C 2s ||C 1s to the mobile intelligent terminal cipher component;
解密单元,用于所述移动智能终端密码组件使用其自身的私钥dM解密C2s,得到rMs,然后使用rMs解密C1s,得到(R||MKC||用户ID||rs1);A decryption unit, used for the mobile intelligent terminal cryptographic component to decrypt C 2s using its own private key d M to obtain r Ms , and then use r Ms to decrypt C 1s to obtain (R||MKC||user ID||rs 1 );
验签单元,用于所述移动智能终端密码组件签名验签rs1;a signature verification unit, used for signature verification rs 1 of the cryptographic component of the mobile intelligent terminal;
存储单元,用于所述移动智能终端密码组件保存用户ID作为移动智能终端密码组件的标识。A storage unit, used for the smart mobile terminal password component to store the user ID as the identification of the mobile smart terminal password component.
本发明实施例所提供的敏感安全数据加密装置进一步引入了安全机制,通过对移动智能终端个人特征数据、服务端主密钥分量在传输过程中的加密,进一步保证了数据的安全性。The sensitive security data encryption device provided by the embodiment of the present invention further introduces a security mechanism, and further ensures the security of the data by encrypting the personal characteristic data of the mobile intelligent terminal and the server master key component during the transmission process.
本发明实施例还提供了对加密的敏感安全数据进行解密的装置,该加密的敏感安全数据是采用基于上述任一本发明实施例所提供的敏感安全数据加密装置加密后得到的。图9为本发明实施例提供的敏感安全数据解密装置的结构图,如图9所示,本发明实施例提供的敏感安全数据解密装置包括:The embodiment of the present invention also provides a device for decrypting encrypted sensitive security data, where the encrypted sensitive security data is obtained by encrypting the sensitive security data encryption device based on any of the above embodiments of the present invention. FIG. 9 is a structural diagram of an apparatus for decrypting sensitive security data provided by an embodiment of the present invention. As shown in FIG. 9 , the apparatus for decrypting sensitive security data provided by an embodiment of the present invention includes:
待验证的移动智能终端个人特征数据传输模块901,用于移动智能终端密码组件将所获得的待验证的移动智能终端个人特征数据传输给服务端密码组件;The personal characteristic
移动智能终端个人数据验证成功模块902,用于所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对一致;The mobile intelligent terminal personal data
服务端主密钥分量传输模块903,用于所述服务端主密钥分量传输到所述移动智能终端密码组件;a server-side master key
主密钥生成模块904,用于基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用本发明实施例所提供的主密钥生成装置生成主密钥;A master
解密模块905,用于从密钥容器中获取加密后的敏感安全数据,采用主密钥对该加密后的敏感安全数据进行解密,得到未经加密的敏感安全数据。The
基于上述任一本发明实施例,本发明另一实施例提供的敏感安全数据解密装置还包括:Based on any of the above embodiments of the present invention, the sensitive security data decryption device provided by another embodiment of the present invention further includes:
移动智能终端个人数据验证失败模块,用于所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对不一致,将所述服务端主密钥分量清零,所述移动智能终端密码组件识别出所述服务端主密钥分量的值为零时提示失败,结束操作。The mobile intelligent terminal personal data verification failure module is used for the server cipher component to extract the stored personal characteristic data of the mobile intelligent terminal and the server master key component from the key container, and the personal characteristics of the mobile intelligent terminal to be verified. If the data is inconsistent with the stored personal data of the mobile intelligent terminal, clear the server master key component to zero, and the mobile intelligent terminal cipher component recognizes that the value of the server master key component is zero. Fail, end the operation.
基于上述任一本发明实施例,本发明另一实施例提供的敏感安全数据解密装置对图9所示敏感安全数据解密装置相关模块的功能做了进一步扩充;其中,Based on any of the above embodiments of the present invention, the sensitive security data decryption device provided by another embodiment of the present invention further expands the functions of the relevant modules of the sensitive security data decryption device shown in FIG. 9; wherein,
所述待验证的移动智能终端个人特征数据传输模块包括:The to-be-verified mobile intelligent terminal personal characteristic data transmission module includes:
请求验证单元,用于所述移动智能终端密码组件向所述服务端密码组件请求移动智能终端个人特征数据验证;a request verification unit, used for the mobile intelligent terminal password component to request the mobile intelligent terminal personal characteristic data verification from the server password component;
传输单元,用于所述服务端密码组件发送随机数R给所述移动智能终端密码组件;a transmission unit, used for the server cipher component to send a random number R to the mobile intelligent terminal cipher component;
合并与加密单元,用于所述移动智能终端密码组件将随机数R、用户ID、待验证的移动智能终端个人特征数据杂凑值HPPD′进行合并,根据该合并结果(R||用户ID||HPPD′)分别随机生成密钥rM1、rM2,使用rM1加密得到C1,并将C1||rM1||rM2使用服务端密码组件的公钥PS加密,得到C2;The merging and encryption unit is used for the mobile intelligent terminal password component to merge the random number R, the user ID, and the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified, and according to the combination result (R||user ID|| HPPD′) randomly generate keys r M1 and r M2 respectively, use r M1 to encrypt to obtain C 1 , and encrypt C1||r M1 ||r M2 with the public key P S of the server cipher component to obtain C 2 ;
传输单元,用于所述移动智能终端密码组件将数据(C2||C1)发送给服务端密码组件。A transmission unit, used for the mobile smart terminal cryptographic component to send the data (C 2 ||C 1 ) to the server-side cryptographic component.
所述移动智能终端个人数据验证成功模块包括:The successful module of the mobile intelligent terminal personal data verification includes:
解密单元,用于所述服务端密码组件使用自身私钥dS解密C2,得到rM1和rM2,然后使用rM1解密C1得到(R||用户ID||HPPD′);a decryption unit, used for the server cryptographic component to decrypt C 2 using its own private key d S to obtain r M1 and r M2 , and then use r M1 to decrypt C 1 to obtain (R||user ID||HPPD');
验证成功单元,用于所述服务端密码组件根据用户ID从密钥容器中得到移动智能终端密码组件的对应数据(HPPD||MKC||PM||PPD尝试次数),并用服务端密码组件存储密钥KS解密,成功验证待验证的移动智能终端个人特征数据杂凑值HPPD′与移动智能终端个人特征数据杂凑值HPPD的一致性、PPD尝试次数。The verification success unit is used for the server-side password component to obtain the corresponding data (HPPD||MKC||PM||PPD attempts) from the key container of the mobile intelligent terminal according to the user ID, and store it in the server-side password component The key K S is decrypted to successfully verify the consistency of the hash value HPPD' of the personal characteristic data of the mobile intelligent terminal to be verified and the hash value HPPD of the personal characteristic data of the mobile intelligent terminal, and the number of PPD attempts.
本发明实施例所提供的敏感安全数据解密装置进一步引入了安全机制,通过对移动智能终端个人特征数据、服务端主密钥分量在传输过程中的加密,进一步保证了数据的安全性。The sensitive security data decryption device provided by the embodiment of the present invention further introduces a security mechanism, and further ensures data security by encrypting the personal characteristic data of the mobile intelligent terminal and the server master key component during the transmission process.
图10示例了一种电子设备的实体结构示意图,如图10所示,该电子设备可以包括:处理器(processor)1010、通信接口(Communications Interface)1020、存储器(memory)1030和通信总线1040,其中,处理器1010,通信接口1020,存储器1030通过通信总线1040完成相互间的通信。处理器1010可以调用存储器1030中的逻辑指令,以执行如下方法:将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥。或执行如下方法:移动智能终端密码组件将所获得的移动智能终端个人特征数据传输给服务端密码组件;所述服务端密码组件将所生成的服务端主密钥分量与所接收的所述移动智能终端个人特征数据保存在密钥容器中;所述移动智能终端密码组件从所述服务端密码组件接收所述服务端主密钥分量;基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成方法生成主密钥;采用所述主密钥对敏感安全数据进行加密,将加密后的敏感安全数据保存在所述密钥容器中。或执行如下方法:移动智能终端密码组件将所获得的待验证的移动智能终端个人特征数据传输给服务端密码组件;所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对一致;所述服务端主密钥分量传输到所述移动智能终端密码组件;基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成方法生成主密钥;从密钥容器中获取加密后的敏感安全数据,采用主密钥对该加密后的敏感安全数据进行解密,得到未经加密的敏感安全数据。FIG. 10 illustrates a schematic diagram of the physical structure of an electronic device. As shown in FIG. 10 , the electronic device may include: a processor (processor) 1010, a communication interface (Communications Interface) 1020, a memory (memory) 1030, and a
此外,上述的存储器1030中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。In addition, the above-mentioned logic instructions in the
另一方面,本发明实施例还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现以执行上述各实施例提供的方法,例如包括:将移动智能终端个人特征数据与服务端主密钥分量进行组合,基于组合后的结果生成主密钥。或:移动智能终端密码组件将所获得的移动智能终端个人特征数据传输给服务端密码组件;所述服务端密码组件将所生成的服务端主密钥分量与所接收的所述移动智能终端个人特征数据保存在密钥容器中;所述移动智能终端密码组件从所述服务端密码组件接收所述服务端主密钥分量;基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成方法生成主密钥;采用所述主密钥对敏感安全数据进行加密,将加密后的敏感安全数据保存在所述密钥容器中。或:移动智能终端密码组件将所获得的待验证的移动智能终端个人特征数据传输给服务端密码组件;所述服务端密码组件从密钥容器中提取所存储的移动智能终端个人特征数据以及服务端主密钥分量,所述待验证的移动智能终端个人特征数据与所述所存储的移动智能终端个人数据核对一致;所述服务端主密钥分量传输到所述移动智能终端密码组件;基于所述移动智能终端个人特征数据、所述服务端主密钥分量,采用所述的主密钥生成方法生成主密钥;从密钥容器中获取加密后的敏感安全数据,采用主密钥对该加密后的敏感安全数据进行解密,得到未经加密的敏感安全数据。On the other hand, an embodiment of the present invention further provides a non-transitory computer-readable storage medium on which a computer program is stored, and the computer program is implemented when executed by a processor to execute the methods provided by the foregoing embodiments, for example, including: The personal characteristic data of the mobile intelligent terminal and the server master key component are combined, and the master key is generated based on the combined result. Or: the mobile intelligent terminal cipher component transmits the obtained personal characteristic data of the mobile intelligent terminal to the server cipher component; the server cipher component combines the generated server master key component with the received personal data of the mobile intelligent terminal The feature data is stored in the key container; the smart mobile terminal cryptographic component receives the server master key component from the server cryptographic component; based on the personal feature data of the mobile smart terminal, the server master key components, the master key is generated by using the master key generation method; the sensitive security data is encrypted by using the master key, and the encrypted sensitive security data is stored in the key container. Or: the mobile intelligent terminal cipher component transmits the obtained personal characteristic data of the mobile intelligent terminal to be verified to the server cipher component; the server cipher component extracts the stored mobile intelligent terminal personal characteristic data and services from the key container The terminal master key component, the personal characteristic data of the mobile intelligent terminal to be verified is checked and consistent with the stored personal data of the mobile intelligent terminal; the server master key component is transmitted to the mobile intelligent terminal password component; based on The personal characteristic data of the mobile intelligent terminal and the server master key component are generated by using the master key generation method; the encrypted sensitive security data is obtained from the key container, and the master key pair is used to generate the master key. The encrypted sensitive security data is decrypted to obtain unencrypted sensitive security data.
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The device embodiments described above are only illustrative, wherein the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in One place, or it can be distributed over multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment. Those of ordinary skill in the art can understand and implement it without creative effort.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。From the description of the above embodiments, those skilled in the art can clearly understand that each embodiment can be implemented by means of software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on this understanding, the above-mentioned technical solutions can be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products can be stored in computer-readable storage media, such as ROM/RAM, magnetic A disc, an optical disc, etc., includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments or some parts of the embodiments.
最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, but not to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that it can still be The technical solutions described in the foregoing embodiments are modified, or some technical features thereof are equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910943934.1A CN110768792B (en) | 2019-09-30 | 2019-09-30 | Main key generation method, device and encryption and decryption method for sensitive security parameters |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910943934.1A CN110768792B (en) | 2019-09-30 | 2019-09-30 | Main key generation method, device and encryption and decryption method for sensitive security parameters |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110768792A true CN110768792A (en) | 2020-02-07 |
CN110768792B CN110768792B (en) | 2023-09-05 |
Family
ID=69330113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910943934.1A Active CN110768792B (en) | 2019-09-30 | 2019-09-30 | Main key generation method, device and encryption and decryption method for sensitive security parameters |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110768792B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11880482B2 (en) | 2020-12-10 | 2024-01-23 | International Business Machines Corporation | Secure smart containers for controlling access to data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1871810A (en) * | 2003-10-28 | 2006-11-29 | 财团法人生产技术研究奖励会 | Authentication system, and remotely distributed storage system |
CN103259651A (en) * | 2013-05-30 | 2013-08-21 | 成都欣知科技有限公司 | Encryption and decryption method and system of terminal data |
CN103684766A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Private key protection method and system for terminal user |
CN105991569A (en) * | 2015-02-09 | 2016-10-05 | 中国科学院信息工程研究所 | Safe transmission method of TLS communication data |
CN106790278A (en) * | 2017-02-21 | 2017-05-31 | 中国信息安全测评中心 | A kind of mutual authentication method and communication system |
CN109067746A (en) * | 2018-08-10 | 2018-12-21 | 北京奇虎科技有限公司 | Communication means and device between client and server |
CN109617681A (en) * | 2018-12-06 | 2019-04-12 | 成都卫士通信息产业股份有限公司 | Encryption and decryption method and device, electronic equipment, computer readable storage medium |
US20190222419A1 (en) * | 2018-01-12 | 2019-07-18 | Blackberry Limited | Secure container based protection of password accessible master encryption keys |
-
2019
- 2019-09-30 CN CN201910943934.1A patent/CN110768792B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1871810A (en) * | 2003-10-28 | 2006-11-29 | 财团法人生产技术研究奖励会 | Authentication system, and remotely distributed storage system |
CN103684766A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Private key protection method and system for terminal user |
CN103259651A (en) * | 2013-05-30 | 2013-08-21 | 成都欣知科技有限公司 | Encryption and decryption method and system of terminal data |
CN105991569A (en) * | 2015-02-09 | 2016-10-05 | 中国科学院信息工程研究所 | Safe transmission method of TLS communication data |
CN106790278A (en) * | 2017-02-21 | 2017-05-31 | 中国信息安全测评中心 | A kind of mutual authentication method and communication system |
US20190222419A1 (en) * | 2018-01-12 | 2019-07-18 | Blackberry Limited | Secure container based protection of password accessible master encryption keys |
CN109067746A (en) * | 2018-08-10 | 2018-12-21 | 北京奇虎科技有限公司 | Communication means and device between client and server |
CN109617681A (en) * | 2018-12-06 | 2019-04-12 | 成都卫士通信息产业股份有限公司 | Encryption and decryption method and device, electronic equipment, computer readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11880482B2 (en) | 2020-12-10 | 2024-01-23 | International Business Machines Corporation | Secure smart containers for controlling access to data |
Also Published As
Publication number | Publication date |
---|---|
CN110768792B (en) | 2023-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110519046B (en) | Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD | |
CN108650210A (en) | A kind of Verification System and method | |
CN110009346A (en) | For splitting and restoring method, program product, storage medium and the system of key | |
CN111935712A (en) | Data transmission method, system and medium based on NB-IoT communication | |
CN101005357A (en) | Method and system for updating certification key | |
KR102017758B1 (en) | Health device, gateway device and method for securing protocol using the same | |
CN108809633B (en) | Identity authentication method, device and system | |
CN112351037B (en) | Information processing method and device for secure communication | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN110138548B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol | |
CN110493177B (en) | Method and system for quantum communication service station AKA key negotiation based on asymmetric key pool pair and serial number | |
CN108471352A (en) | Processing method, system, computer equipment based on distributed private key and storage medium | |
CN105391734A (en) | Secure login system, secure login method, login server and authentication server | |
CN109754241B (en) | Hard wallet and verification method based on hard wallet | |
CN111327629B (en) | Identity verification method, client and server | |
CN111526007B (en) | Random number generation method and system | |
CN109375882A (en) | It is a kind of based on without mark biological identification safe printing method and system | |
CN110380859B (en) | Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol | |
CN113507372A (en) | Bidirectional authentication method for interface request | |
CN110098925B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number | |
CN103905388A (en) | Authentication method, authentication device, smart card, and server | |
CN110519222B (en) | External network access identity authentication method and system based on disposable asymmetric key pair and key fob | |
CN110690969A (en) | Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties | |
CN119766433A (en) | A method, device and system for encrypted communication supporting post-quantum algorithm | |
WO2020042023A1 (en) | Instant messaging data encryption method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Applicant after: QAX Technology Group Inc. Applicant after: Qianxin Wangshen information technology (Beijing) Co.,Ltd. Address before: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Applicant before: QAX Technology Group Inc. Applicant before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |